Android Security Mechanism Analysis and Application practices

Source: Internet
Author: User

Android Security Mechanism Analysis and Application practices

Author of basic information: Wu Qian Zhao chenyi Guo Ying Press: Machinery Industry Press ISBN: 9787111420163 mounting Date: May 2013 published on: 16 open page: 1 version: 1-1 category: more about computers and introduction to Android Security Mechanism Analysis and Application practices computer books Android Security Mechanism Analysis and Application practices are classic books in the android security field, it not only thoroughly analyzes the principles, but also provides methods to deal with various security problems, with both principles and practices. First, the security mechanism and implementation principle of Android are analyzed from the application layer, application framework layer, hardware abstraction layer, and system kernel layer based on the source code of Android system, and the deficiencies and potential risks in the security mechanism. Then, the common practical analysis tools, security risk analysis methods, and security policies are described in detail, and a variety of common security problems (kernel, file system, applications and wireless communication) solutions. The book consists of nine chapters, which are divided into three parts: preparation (1 ~ Chapter 2) introduces the Android system architecture and security model; Principles (3 ~ Chapter 5) First, the security mechanism, system security, and application security principles of the Android system are deeply analyzed from the perspective of source code, then I explained in detail various practical analysis methods, analysis tools and core technologies. Practice (6 ~ Chapter 9) it explains how to enhance the security of the Android system by modifying the source code, analysis of the principle of the encrypted file system and system configuration, and various practical Security Solutions (Application permission control, application signature, and static code Analysis, firewall, storage encryption, and key points of component development ), and Android wireless communication security. Contents: Android Security Mechanism Analysis and Application practices Preface Part 1 Preparation Chapter 2 Android basics/1st Android system architecture/21.1.1 Linux kernel layer/31.1.2 Hardware Abstraction Layer/41.1.3 system Runtime Library layer/51.1.4 application framework layer/71.1.5 Application Layer/71.2 application component/81.3 Android system startup/101.3.1 Linux system startup/101.3.2 Android Application System Startup/151.4 Android system upgrade/171.4.1 Android data cable upgrade/171.4.2 Android SD card upgrade/171.4.3 Android online upgrade/181.5 Summary/18. chapter 2 Android security model/2nd Linux security model/202.1.1 user and permission/212.1.2 process and memory space/192.1 Android security mechanism/262.2.1 process sandbox/262.2.2 application permission/282.2.3 Process Communication/292.2.4 memory Management/322.2.5 Android system partitioning and loading/352.2.6 application signature/362.3 security mechanism provided by Android development tools/372.4 summary of this chapter/38 principles of the Second Part Chapter 3rd Android Security Mechanism source code analysis /403.1 code implementation of file system permissions/code implementation of 413.2 Process Communication Mechanism/443.2.1 anonymous shared memory/443.2.2 Binder Mechanism/503.3 Android Application Security Mechanism/563.3.1 Android Application permission Mechanism source code analysis/563.3.2 source code analysis implemented by the application signature mechanism/623.4 Summary/65 chapter 4th Android security analysis/664.1 Android system security analysis/664.1.1 Linux kernel/664.1.2 system library/674.1.3 Dalvik Virtual Machine/ 674.2 Android app security analysis/684.2.1 app permissions/684.2.2 app installation/694.2.3 Web Browser/704.2.4 database and SQL injection/704.2.5 software update/714.3 hardware security analysis/724.4 malware/724.4.1 linux malware/734.4.2 Android malware/744.5 security risks and vulnerabilities/754.5.1 known security risks/754.5.2 potential security vulnerabilities/764.6 summary of this chapter/76 chapter 5th Android practical security analysis tool/785.1 practical analysis Method/785.1.1 Linux system information analysis/795.1.2 Android Application Information Analysis/865.2 practical analysis tool/925.2.1 Android system debugging tool/925.2.2 dumpsys tool/1035.2.3 application analysis tool/1045.3 professional analysis tool and Technology/commonly used logical analysis tools and technologies/commonly used physical analysis tools and technologies/1085.4 summary of this chapter/110 Part 3 practice chapter 6th se Android-enhanced Android Security/1146.1 kernel Security risk and enhancement policy/1146.2 se Android Overview/1146.3 se Android compilation and installation/1156.3.1 source code acquisition/1156.3.2 source code structure/4246.3.3 source code compilation and installation/1186.4 se Android Security Policy Overview/1246.4.1 seapp_contexts file/1256.4.2 property_contexts file/1256.4.3 mac_permissions.xml file/1266.5 se Android compatibility testing tool/1276.6 se Android permission restriction policy/restricted permission model/6.6.2 MAC/1286.6.3 permission cancellation during installation /1286.6.4 permission label propagation/1296.6.5 se other classes and permission policies of Android/1296.7 summary of this chapter/129 chapter 7th Android Encrypted File System/1307.1 overview of encrypted file system/1307.2 introduction of encryption algorithms/1317.2.1 AES encryption algorithm/1317.2.2 encryption mode/1317.3 encryption file system source code analysis/1337.3.1 Linux kernel DM-crypt/1347.3.2 Android vold/1387.3.3 workflow analysis/1457.4 Encryption File System Configuration/1487.4.1 Block device selection and configuration/1487.4.2 init. RC configuration/1497.5 Chapter Summary/150 chapter 8th Android Application Security practical solution/1518.1 Security Risk Control Policy/1518.2 application permission control/1548.2.1 permission Control Policy/1548.2.2 permission definition and application/1568.3 application signature/1598.3.1 basic digital signature knowledge/1608.3.2 digital signature algorithm/1608.3.3 digital signature usage/1638.3.4 application Signature implementation/1648.4 static code analysis/1668.5 Firewall/1688.6 data storage encryption /1708.7 security points for application component development/1728.7.1 private and public components/1728.7.2 activity Security/1738.7.3 Service Security/1748.7.4 content provider Security/1758.7.5 broadcast receiver er security/1808.7.6 intent Security/1828.7.7 binder Security/1848.8 summary of this chapter/185 chapter 9th wireless communication security of Android/1869.1 security threats and prevention of wireless mobile communication/1869.1.1 empty port encryption and plaintext transmission of voice communication/1879.1.2 SMS and MMS storage and forwarding mechanism/1889.1.3 traditional wired listening and legal monitoring/1899.1.4 end-to-end communication security mechanism/1899.2 Android Wireless Mobile Phone System/ipv9.2.1 Wireless Mobile Phone System Structure/ipv9.2.2 Wireless Mobile Phone System RIL layer Implementation of the telephone system/ipv9.2.3 application layer framework of the Wireless Mobile Phone System/1939.3 encryption of SMS and MMS/1969.3.1 process of sending and receiving common SMS and MMS/1969.3.2 digital encryption of SMS and MMS /2089.3.3 transmission of encrypted text messages and MMS/2109.3.4 storage and retrieval of encrypted text messages and MMS/2109.4 encrypted real-time voice communication/2149.4.1 at command and telephone creation process/2149.4.2 Android audio system phone number some/2169.4.3 telephone audio channel settings/2179.4.4 telephone audio encryption/2189.5 Summary/222 Book Information Source: china Interactive publishing network
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.